FSC.DEL/41/09

16 March 2009

OSCE+

ENGLISH only

 

Organization for Security and Co-operation in Europe Secretariat

 

Conference Services

 

OSCE WORKSHOP ON A COMPREHENSIVE OSCE APPROACH TO ENHANCING CYBER SECURITY

 

Working Session 3

 

Role of the private sector, civil society and the individual Internet user

 

Col Mag Dr Friedrich Teichmann MAS MSc

 

Deputy Director Communication and Information Systems Planning Department,

Ministry of Defense and Sports of Austria

 

Keynote Presentation

 

 

MINISTRY OF DEFENSE AND SPORT

CIS Plans

 

Cyber Security at home:

A new Perspective!

 

Col Friedrich Teichmann

 

OSCE workshop on a comprehensive OSCE approach to enhancing CYBER SECURITY

 

March 2009, Vienna

 

 

Examples of «IT-security» measures

 

- IT security policy

- Firewalls, DMZ (De-Militarized Zone)

- Network architecture - topology

- Crypto-Management

- Security patches, Security reports

- Information security officer

- Access codes SLA (service level agreements)

- Classifications

- Vulnerability checks

- Disaster recovery tools

- Account management

- Change request - VPN, RAS, SSL, PKI

- Key management, Single Sign on

- ...

- ...

What do all this «IT-security» measures have in common?

 

Examples of «IT-security» measures

 

- IT security policy

- Firewalls, DMZ (De-Militarized Zone)

- Network architecture - topology

- Crypto-Management

- Security patches, Security reports

- Information security officer

- Access codes SLA (service level agreements)

- Classifications

- Vulnerability checks

- Disaster recovery tools

- Account management

- Change request - VPN, RAS, SSL, PKI

- Key management, Single Sign on

- ...

- ...

What do all this «IT-security» measures have in common?

 

They are focused primarily and implemented almost exclusively in large companies or organizations

 

Some more questions

 

- Current number of Internet users worldwide?

- Number of emails worldwide per day?

 

Some more questions

 

- Current number of Internet users worldwide? 1,574 Billion (2355%) (internetworldstats Dec 2008)

- Number of emails worldwide per day? 200 Billion (Cisco spam report Dec 2008)

 

Some more questions

 

- Current number of Internet users worldwide? 1, 574 Billion (internetworldstats Dec 2008)

- Number of emails worldwide per day? 200 Billion (Cisco spam report Dec 2008)

- How did they find my email address for the spam onslaughts?

- How did they get my password, my pin, my credit card number, access to my bank account, my TAN?

- What were/are possible «Code red» (2001) and «conficker» (2009) purposes?

- Where do all the Zombies and Bot-networks come from?

- Who is the most vulnerable to a virus/worm attack? The one with or the one without a professional security organization?

- Who is the «home user»? What is his/her user characteristics?

 

The internet home user: purpose and dangers

 

Children

Teenagers

General user

Admin

Tele-worker

learning

first steps

play and toy

school needs research communication

communication information e-banking

maintenance updates data-management

work

communication

curiosity,

just for fun,

trial and error,

experiment,

pop-ups,

no awareness of the dangerous

downloads,

pay cites,

excessive use,

social-engineering,

ignore the dangarous

 

spam mail,

pishing,

social-engineering,

 

 

virus and worms, patches, (rnal)- software,

sneak-software

company net into sec

 

 

Complex IT-attacks (1)

 

 

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

 

 

Complex IT-attacks (2)

 

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

 

Complex IT-attacks (3)

 

 

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

 

 

Botnet and Zombies

 

Zombies are mostly home PC (viruslist.com - Kasperski Lab May 2008)

 

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

1. Virus writer sends out viruses, infecting ordinary users' Windows PCs.

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

2. Infected PCs logon forming a network of infected systems known as a botnet.

3. Spammer purchases access to this botnet from virus writer or a dealer.

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

4. Attacker sends commands to the botnet, instructing the infected PCs to send out mails.

5. The infected PCs send mails (spam) or create traffic (DoS) to; the target.

 

Cyber crime - «easy money»?

Some provocative numbers

 

Virus and worms:

«Code Red» infected 250 000 hosts in 9 hours (Caida.org 2001)

«Conficker» infected 9 Mio PCs in 4 days (f-secure.com Jan 2009)

 

DoS:

Bot-Net with 50 000 PC can be bought for several thousand dollars

50 000 PC generate Gbits/s of traffic - enough for a «simple» Dos attack

(Security&Privacy Jul/Aug 2007, Security and the Net Aug 2008)

 

Spam:

1 Mio email addresses costs several dollars

10 Mio high quality addresses for several thousand dollars

1$ bonus per spam «interest»

with a 0,01% answers rate

1 Mio emails sent

will result in 100$ win per mailing

 

The new perspective of «cyber danger» at home

 

direct

versus

indirect

virus

 

home PC used as zombie or drone

spam, pishing

 

bot-net, zombie-net

harvest (passwords, money-transactions PIN, TAN)

 

MITM (man in the middle)

social engineering

 

complex «organized cyber crime»

other

 

other

 

Globalization and modern IT has produced an environment, where cyber criminality has taken root. All members of society, private and public, must unite in increasing IT security worldwide.

 

Recommendations for a multi-dimensiona and joint approach for a better cyber security

 

Home user:

Be aware! Improve your IT-security!

 

Industry:

Provide simple, cheap and efficient ΊΤ-security» for home users!

 

Schools:

Teach IT-security at all levels! The next generation should be better informed!

 

Companies and organizations:

Improve collaboration in «Computer Network Operations»!

 

Government:

Encourage a nation-wide (including home user) and realistic IT-security campaign!

 

International organizations:

Focus on cyber operations and specially against Organized IT-Crime»!

 

Thank you for your attention

 

Colonel Mag Dr Friedrich Teichmann MAS MSc

Friedrich.teichmann@bmlvs.gv.at

+43-664-6222626

Deputy Director, Communication and Information System Plans Division, MoD Austria

Previous posts: Cdr RCC4 EUFOR ALTHEA BiH, A6 Air Force, Chief Geo LCC

Academic career: PhD in Geosciences (University of Rochester, USA)

IT-GIS (University of Salzburg), Telematic Management (University of Krems)

Role of the private sector, civil society and the individual Internet user (Dr Friedrich Teichmann, Deputy Director Communication and Information Systems Planning Department, Ministry of Defense and Sports of Austria)

 

 

20 марта 2009, 16:34
Источник, интернет-ресурс: Прочие

Если вы обнаружили ошибку или опечатку – выделите фрагмент текста с ошибкой и нажмите на ссылку сообщить об ошибке.

Акции
Комментарии
Загрузка комментариев...
Если вы видите данное сообщение, значит возникли проблемы с работой системы комментариев. Возможно у вас отключен JavaScript или заблокирован сайт http://hypercomments.com
Введите имя
Чтобы увидеть код начните набирать сообщение Введите код из 3 сим-волов, отображенных черным цветом. Язык кода - русский. обновить код